[bfcpbis] Comments on draft-ietf-bfcpbis-rfc4582bis-04

"Alfred E. Heggestad" <aeh@db.org> Mon, 16 July 2012 12:50 UTC

Return-Path: <aeh@db.org>
X-Original-To: bfcpbis@ietfa.amsl.com
Delivered-To: bfcpbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D6CCD21F8800 for <bfcpbis@ietfa.amsl.com>; Mon, 16 Jul 2012 05:50:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LSZPRyor-OSj for <bfcpbis@ietfa.amsl.com>; Mon, 16 Jul 2012 05:50:52 -0700 (PDT)
Received: from mailstore05.sysedata.no (mailstore05.sysedata.no [195.159.29.9]) by ietfa.amsl.com (Postfix) with ESMTP id E3F9D21F8810 for <bfcpbis@ietf.org>; Mon, 16 Jul 2012 05:50:51 -0700 (PDT)
Received: from [64.103.25.233] (helo=[10.54.86.36]) by mailstore05.sysedata.no with esmtpa (Exim 4.72) (envelope-from <aeh@db.org>) id 1Sqkly-0002RI-J8 for bfcpbis@ietf.org; Mon, 16 Jul 2012 14:51:34 +0200
Message-ID: <50040E56.5000500@db.org>
Date: Mon, 16 Jul 2012 14:51:34 +0200
From: "Alfred E. Heggestad" <aeh@db.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0.4) Gecko/20120510 Icedove/10.0.4
MIME-Version: 1.0
To: bfcpbis@ietf.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [bfcpbis] Comments on draft-ietf-bfcpbis-rfc4582bis-04
X-BeenThere: bfcpbis@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: BFCPBIS working group discussion list <bfcpbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/bfcpbis>
List-Post: <mailto:bfcpbis@ietf.org>
List-Help: <mailto:bfcpbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jul 2012 12:50:53 -0000

Hi,


here is my review comments of draft-ietf-bfcpbis-rfc4582bis-04




 > Section 5.1
 >
>    R: The Transaction Responder (R) flag-bit has relevance only for use
>    of BFCP over unreliable transport.  When cleared, it indicates that
>    this message is a request initiating a new transaction, and the
>    Transaction ID that follows has been generated for this transaction.
>    When set, it indicates that this message is a response to a previous
>    request, and the Transaction ID that follows is the one associated
>    with that request.  When BFCP is used over reliable transports, the
>    flag has no significance and SHOULD be cleared.

suggest rewrite to .. "SHALL be cleared by the sender and ignored by
the receiver"




> 6.2. Unreliable Transport
>
>
>    BFCP entities may elect to exchange BFCP messages using UDP
>    datagrams.  UDP is an unreliable transport where neither delivery nor
>    ordering is assured.  Each BFCP UDP datagram MUST contain exactly one
>    BFCP message.  In the event the size of a BFCP message exceeds the
>    MTU size, the BFCP message will be fragmented at the IP layer.

from the wording it is not clear that message fragmentation is handled
by BFCP itself.. it can be mis-interpreted to think that the IP layer
is responsible for that. perhaps we should reword this part a bit,
to make it explicitly clear that BFCP messages above MTU size MUST be
fragmented by the BFCP-layer itself.




>    client MAY discard the message and await retransmission.  BFCP
>    entities receiving an Error message with value 10 SHOULD acknowledge
>    the error and act accordingly.

I believed that it is not possible to acknowledge an Error message anymore,
since the ErrorAck primitive was deleted from the spec... (?)





> 6.3.2. NAT Traversal
>
 > ...
 >
>    In order to facilitate the initial establishment of NAT bindings, and
>    to maintain those bindings once established, BFCP over UDP entities
>    are RECOMMENDED to use STUN [11] for keep-alives, as described for
>    SIP [10].

reference [10] points to sip-outbound, to make this explicitly more clear
we could rename the text to "SIP Outbound [10].

using STUN for keepalive in SIP-outbound is done from the SIP-client to
the SIP-server, which has an embedded STUN server to reply to STUN messages.
it is not very clear to me how this usage is defined in BFCP.

for example, what should happen if a STUN Request/Response exchange times out?
should we try again or treat it as an implicit Goodbye message ?




>    This results in each BFCP entity sending a packet, both to
>    open the pinhole and to learn what IP/port the NAT assigned for the
>    binding.

I think the text about learning IP/port should be deleted, I dont think
that this information should be used for anything.

I believed that STUN/BFCP is mainly about NAT keepalive, and not about
NAT traversal as should be defined outside this document (e.g. ICE).



...



NOTE: kudos to the authors for doing a great job!


/alfred